scientific article; zbMATH DE number 2086725

From MaRDI portal

zbMath1056.94514MaRDI QIDQ4737264

Ben Lynn, Unnamed Author

Publication date: 11 August 2004

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2332/23320466.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

An efficient IBE scheme with tight security reduction in the random oracle model, Hierarchical Identity-Based Encryption with Tight Multi-challenge Security, Efficient subtree-based encryption for fuzzy-entity data sharing, HIBE: Hierarchical Identity-Based Encryption, Extended dual system group and shorter unbounded hierarchical identity based encryption, Fine-grained secure attribute-based encryption, Fine-grained forward secrecy: allow-list/deny-list encryption and applications, Generic constructions for fully secure revocable attribute-based encryption, Efficient revocable identity-based encryption via subset difference methods, Revocable hierarchical identity-based encryption with shorter private keys and update keys, Bonsai trees, or how to delegate a lattice basis, Unique-path identity based encryption with applications to strongly secure messaging, Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks, Forward-secure encryption with fast forwarding, You can sign but not decrypt: hierarchical integrated encryption and signature, Traceable receipt-free encryption, A survey on functional encryption, Wildcarded identity-based encryption, Relations between semantic security and anonymity in identity-based encryption, Dual trapdoor identity-based encryption with keyword search, Revocable hierarchical identity-based encryption via history-free approach, Unbounded HIBE with tight security, Securing Information Exchange in VANETs by Using Pairing-Based Cryptography, Updatable public key encryption in the standard model, Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme, The relation and transformation between hierarchical inner product encryption and spatial encryption, An Identity-Based Key Agreement Protocol for the Network Layer, Efficient selective identity-based encryption without random oracles, Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys, Compact Hierarchical IBE from Lattices in the Standard Model, SecHome: A Secure Large-Scale Smart Home System Using Hierarchical Identity Based Encryption, Simplified Revocable Hierarchical Identity-Based Encryption from Lattices, Trapdoor delegation and HIBE from middle-product LWE in standard model, Efficient identity-based encryption with hierarchical key-insulation from HIBE, Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security, Use of ID-Based Cryptography for the Efficient Verification of the Integrity and Authenticity of Web Resources, Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model, Indifferentiable deterministic hashing to elliptic and hyperelliptic curves, Attribute-Based Encryption with Fast Decryption, Anonymous HIBE with short ciphertexts: full security in prime order groups, Revocable hierarchical identity-based encryption, Practical Identity-Based Encryption Without Random Oracles, Generic construction of designated tester public-key encryption with keyword search, Fine-grained secure attribute-based encryption, Multi-Identity Single-Key Decryption without Random Oracles, Generalized Identity Based and Broadcast Encryption Schemes, Identity-Based Online/Offline Encryption, Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts, Policy controlled system with anonymity, Signatures in hierarchical certificateless cryptography: efficient constructions and provable security, Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts, Multi-key Hierarchical Identity-Based Signatures, On the Impossibility of Virtual Black-Box Obfuscation in Idealized Models, Generic constructions of integrated PKE and PEKS, CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption, Supporting dynamic updates in storage clouds with the Akl-Taylor scheme, Revocable hierarchical identity-based encryption with adaptive security, Adaptive-ID Secure Revocable Identity-Based Encryption, Tightly secure hierarchical identity-based encryption, Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme, On Indifferentiable Hashing into the Jacobian of Hyperelliptic Curves of Genus 2, Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions, Verifiable Security of Boneh-Franklin Identity-Based Encryption, A fully distributed hierarchical attribute-based encryption scheme, Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting, Direct chosen-ciphertext secure identity-based key encapsulation without random oracles, New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts, Secure Hierarchical Identity Based Encryption Scheme in the Standard Model, Several security schemes constructed using ECC-based self-certified public key cryptosystems, Unnamed Item, Privacy-preserving encryption scheme using DNA parentage test